漏洞信息
漏洞名称: Teleport 认证绕过漏洞
漏洞编号:
漏洞类型: 权限绕过
漏洞等级: 严重
漏洞描述: Teleport是一款开源的访问管理解决方案,广泛用于企业级服务中,提供SSH、Kubernetes、数据库和其他资源的统一访问入口。它支持多因素认证、访问控制和会话记录等功能,适用于需要高安全性的环境。此漏洞影响Teleport 17.5.2之前的版本,属于认证绕过漏洞。攻击者可以利用此漏洞绕过认证机制,未经授权访问受保护的资源。漏洞的技术根源在于认证流程中的缺陷,使得攻击者能够构造特定的请求绕过安全检查。此漏洞的CVSS评分为9.8,属于严重级别,攻击者无需用户交互即可远程利用,可能导致敏感信息泄露、系统被控制等严重后果。
产品厂商: gravitational
产品名称: Teleport
影响版本: version < 17.5.2
搜索语法: http.favicon.hash:544208100, http.favicon.hash:1854879765, http.favicon.hash:-1275955539, Set-Cookie: __Host-grv_csrf, icon_hash=”544208100”, icon_hash=”1854879765”, icon_hash=”-1275955539”
来源: https://github.com/projectdiscovery/nuclei-templates/blob/61cbd52548fde4e7c307939657da7588b459e25f/http%2Fcves%2F2025%2FCVE-2025-49825.yaml
类型: projectdiscovery/nuclei-templates:github issues
POC详情
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55
| id: CVE-2025-49825
info: name: Teleport - Authentication Bypass author: pdteam severity: critical description: | Teleport versions prior to 17.5.2 are vulnerable to a remote authentication bypass vulnerability. This issue allows attackers to gain unauthorized access to affected systems. classification: cve-id: CVE-2025-49825 cvss-metrics: 3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 reference: - https://github.com/gravitational/teleport/security/advisories/GHSA-8cqv-pj7f-pwpc metadata: verified: true max-request: 1 shodan-query: - http.favicon.hash:544208100 - http.favicon.hash:1854879765 - http.favicon.hash:-1275955539 - "Set-Cookie: __Host-grv_csrf" fofa-query: - icon_hash="544208100" - icon_hash="1854879765" - icon_hash="-1275955539" - "Set-Cookie: __Host-grv_csrf" tags: cve,cve2025,teleport
http: - method: GET path: - "{{BaseURL}}/webapi/ping"
extractors: - type: json name: version json: - .server_version internal: true
- type: json json: - '"Teleport Version: "+ .server_version'
matchers: - type: dsl name: version_check dsl: - compare_versions(version, '< 17.5.2') - contains_all(body, "server_version", "teleport") - '!contains_any(version, "16.5.12", "15.5.3", "14.4.1", "13.4.27", "12.4.35")' condition: and
|